Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win10v2004-20250314-en
General
-
Target
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
-
Size
1.1MB
-
MD5
20e60d89e273331ee5c9c55168663c10
-
SHA1
43f4f20722481704800a8a14eb83c5ee1d7c3d29
-
SHA256
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1
-
SHA512
1fc31a9915419dd6a7c1598eb8e80189fff16448e49835a53fa950e2f62e41f7753b16ff3d2019a1c74fcf5b8d4657c244471918f39c6d82345e07d5dd51d318
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FS:LTgdZOcuUL3xAx/8b2S7Z0k
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2624 AboutSettingsHandlers.exe 2812 AboutSettingsHandlers.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1652-20-0x00000000008A0000-0x0000000000A29000-memory.dmp autoit_exe behavioral1/memory/1652-25-0x00000000008A0000-0x0000000000A29000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2624 set thread context of 2812 2624 AboutSettingsHandlers.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2504 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 1652 wrote to memory of 2828 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 1652 wrote to memory of 2828 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 1652 wrote to memory of 2828 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 1652 wrote to memory of 2828 1652 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 2716 wrote to memory of 2624 2716 taskeng.exe 35 PID 2716 wrote to memory of 2624 2716 taskeng.exe 35 PID 2716 wrote to memory of 2624 2716 taskeng.exe 35 PID 2716 wrote to memory of 2624 2716 taskeng.exe 35 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36 PID 2624 wrote to memory of 2812 2624 AboutSettingsHandlers.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9C05CF98-E28B-48ED-8DD5-608E84ED6E38} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5edf2cfc8ab9f9d7501e4aa738fc5649a
SHA17aeed5c96a6b8530bdead8bf4f2655e0558e9b67
SHA2561f54f02f6f41da4b87d9227eec489835b8d830c59f6e3016925de164498d226e
SHA5124abf87062b43820ca22115d2503ea9ebc190ff81065cfb6cf1fb85fa0c9d11a59d0a852508322b527ec45f3b5aedecb822ceed60e67b8a6f7a9de2f60f4dbcb3
-
Filesize
79B
MD5eaede7430a41f0734406e6b63265763d
SHA1c0a06156ee0176ab163702c8680e5d191fdf9309
SHA256c6008307415892ceebe2d3b1f1e22463f6d12422a306727447d88d557381d822
SHA51250a5c792fa14c3de554f8324b20975f6bd272dc7073f6878a1bdbee0c5437b31b12b1180ca1366e04ba0f90384c6fda04840ad45f1edc0b794a9a9322a5cccf5